Microsoft AB-900 Exam (page: 1)
Microsoft 365 Copilot and Agent Administration Fundamentals
Updated on: 24-Mar-2026

Viewing Page 1 of 7

HOTSPOT

You want to view the administrative actions taken by a service administrator in Microsoft 365.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

Note: Each correct selection is worth one point.

Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Box 1: Yes
Yes - You can use Search & Intelligence in the Microsoft 365 admin center.

The Search & Intelligence feature in the Microsoft 365 admin center allows administrators to manage and customize search experiences, view usage analytics, and configure content sources. Accessed via Settings > Search & intelligence, it enables creating bookmarks, acronyms, and Q&As to improve search relevance across Microsoft 365.

Box 2: Yes
Yes - You can use Audit in the Microsoft Defender portal.

The Audit feature in the Microsoft Defender portal (security.microsoft.com) allows security teams to track and investigate user and administrator activities across Microsoft 365, including Defender for Endpoint, Office 365, and Cloud Apps. It records actions like data retention changes, role modifications, and device isolation, with data searchable for up to 10 years.

Box 3: Yes
Yes - You can use Audit in the Microsoft Purview portal.

Microsoft Purview Audit allows you to track user and administrator actions across Microsoft 365 services to support forensic, compliance, and legal investigations. It is enabled by default for most organizations, with standard logs retained for 180 days, while Premium offers longer retention and higher bandwidth.


Reference:

https://learn.microsoft.com/en-us/defender-office-365/audit-log-search-defender-portal https://www.microsoft.com/en-au/security/business/risk-management/microsoft-purview-audit



HOTSPOT

Select the answer that correctly completes the sentence.

Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Box: time_bound role activation
Microsoft Entra Privileged Identity Management (PIM) provides ____________.

Microsoft Entra Privileged Identity Management (PIM) provides time-bound role activation as a core feature to enforce Just-In-Time (JIT) access. This mechanism ensures users have elevated privileges only for the specific duration needed to complete a task, significantly reducing the risks associated with standing or permanent administrative access.

Key Time-Bound Activation Features
Activation Maximum Duration: Administrators can set a specific limit (typically between 1 and 24 hours) for how long a role remains active once a user elevates their privileges.

Start and End Dates: Assignments themselves can be time-bound, meaning a user is only eligible to activate a role within a specific date range.

Automatic Revocation: Once the pre-configured activation period expires, PIM automatically removes the active assignment, reverting the user to their standard level of access within seconds.

Extension and Renewal: If a task takes longer than expected, users can request to extend an active assignment or renew an expired one, both of which typically require administrative approval.


Reference:

https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-deployment-plan



Your organization has a Microsoft 365 E5 subscription.

You need to ensure that a third-party cloud service can authenticate to Microsoft Entra.

What should you configure?

  1. a Microsoft 365 Copilot connector
  2. multifactor authentication (MFA)
  3. a Conditional Access policy
  4. an app registration

Answer(s): D

Explanation:

To enable a third-party cloud service to authenticate with Microsoft Entra ID in an E5 subscription, you should create an App Registration in the Entra admin center. This creates a service principal, assigning a unique identity, client secrets/certificates, and API permissions (OAuth) for secure token-based authentication.
Key Steps and Considerations:
Create Registration: In the Azure Portal, go to Microsoft Entra ID > App registrations > New registration.
Configure Auth: Define supported account types (e.g., single or multi-tenant) and Redirect URIs.
Secure Access: Generate a client secret or upload a certificate for the application to identify itself securely.
Permissions: Configure API permissions to define what organizational data the third-party app can access.


Reference:

https://easylife365.cloud/stories/app-registrations-microsoft-entra-id-basics



HOTSPOT

Select the answer that correctly completes the sentence.

Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Box: provide control how users can access cloud apps
Conditional Access policies ________________.

Conditional Access (CA) policies in Microsoft Entra ID act as an automated "if-then" risk engine, evaluating signals like user identity, location, and device health to grant, block, or limit access to cloud apps in real-time. These policies enforce Zero Trust by restricting sensitive actions--such as blocking downloads on unmanaged devices--and requiring MFA or compliant devices.


Reference:

https://learn.microsoft.com/en-us/entra/identity/conditional-access/concept-conditional-access-conditions



HOTSPOT

Select the answer that correctly completes the sentence.

Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Box: accountability
The Microsoft responsible AI principle of _______________requires the oversight of AI systems to ensure that humans remain in control.

Microsoft's principle of Accountability in its Responsible AI framework mandates that people--not algorithms-- remain responsible for AI outcomes, ensuring that AI systems remain under meaningful human control.

This principle requires that organizations implement oversight, governance, and audit trails to ensure AI systems are not the final authority on decisions that significantly affect people's lives.


Reference:

https://learn.microsoft.com/en-us/azure/machine-learning/concept-responsible-ai?view=azureml-api-2



HOTSPOT

A user named User5 navigates to https://myapps.microsoft.com. After entering their username and password, User5 receives the following message on their mobile device.



Use the drop-down menus to select the answer choice that completes the statement based on the information presented in the graphic.

Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Box: the Microsoft Authenticator app

When you sign in to a Microsoft app or website, you are prompted with a two-digit number on the login screen that you must then enter into the Microsoft Authenticator app to approve the request. This process is known as

number matching and is designed to enhance security by preventing accidental approvals and countering "MFA fatigue" attacks.

How Number Matching Works
Triggering the Request: After entering your username and password on the login screen (e.g., in a web browser like Chrome or Edge), a unique two-digit number is displayed.

Receiving the Notification: You will receive a push notification on your mobile device from the Microsoft Authenticator app asking, "Are you trying to sign in?".

Entering the Number: To approve the sign-in, you must type the specific number shown on your login screen into the text box provided in the Authenticator app and then tap Yes or Approve.

Contextual Information: Along with the number prompt, the app often displays additional context, such as the application name being accessed and the geographic location of the sign-in attempt, helping you verify the request's legitimacy.


Reference:

https://www.darkreading.com/cloud-security/microsoft-authenticator-to-enforce-number-matching



Your organization has a Microsoft 365 subscription.

You need to evaluate your organization's Identity Secure Score.

Which two factors affect the score? Each correct answer presents a complete the solution.

Note: Each correct selection is worth one point.

  1. the SharePoint site permissions
  2. the number of global administrators
  3. passwords that are never expired
  4. the location of the users

Answer(s): B,C

Explanation:

[B]
The number of Global Administrators directly affects your Identity Secure Score.
The score is impacted by two primary recommendations regarding these roles:
Designate more than one Global Administrator:
Microsoft requires at least two Global Admins to prevent a total lockout if one account is lost or compromised.
One of these should ideally be a "break-glass" emergency access account.
Limit Global Administrators to fewer than five:
Your score may decrease if you have five or more Global Admins.
Having too many increases the attack surface and "privilege creep".
[C]
Enabling "passwords never expire" (specifically, removing mandatory expiration) positively affects your Microsoft 365 Identity Secure Score. Microsoft considers this a best practice, as forcing regular password changes often leads to users choosing weaker, predictable passwords.


Reference:

https://learn.microsoft.com/en-us/entra/identity/monitoring-health/concept-identity-secure-score



Your organization has a Microsoft 365 subscription.

You need to review the impact of a recent phishing incident that targeted email users.

What should you use?

  1. the Microsoft Defender portal
  2. the Microsoft 365 admin center
  3. the Microsoft Entra admin center
  4. the Microsoft Exchange admin center

Answer(s): A

Explanation:

To check the impact of a phishing incident in your Microsoft 365 subscription using the Microsoft Defender portal, you should focus on the Incidents, Email & collaboration reports, and Threat Explorer sections.
1. Identify and Analyze the Incident
2. Investigate Email Details and Exposure
3. Review Remediation Status


Reference:

https://learn.microsoft.com/en-us/defender-xdr/investigate-incidents



Viewing Page 1 of 7



Share your comments for Microsoft AB-900 exam with other users:

Na 8/9/2023 8:39:00 AM

could you please upload cfe fraud prevention and deterrence questions? it will be very much helpful.
Anonymous


shime 10/23/2023 10:03:00 AM

this is really very very helpful for mcd level 1
ETHIOPIA


Vnu 6/3/2023 2:39:00 AM

very helpful!
Anonymous


Steve 8/17/2023 2:19:00 PM

question #18s answer should be a, not d. this should be corrected. it should be minvalidityperiod
CANADA


RITEISH 12/24/2023 4:33:00 AM

thanks for the exact solution
Anonymous


SB 10/15/2023 7:58:00 AM

need to refer the questions and have to give the exam
INDIA


Mike Derfalem 7/16/2023 7:59:00 PM

i need it right now if it was possible please
Anonymous


Isak 7/6/2023 3:21:00 AM

i need it very much please share it in the fastest time.
Anonymous


Maria 6/23/2023 11:40:00 AM

correct answer is d for student.java program
IRELAND


Nagendra Pedipina 7/12/2023 9:10:00 AM

q:37 c is correct
INDIA


John 9/16/2023 9:37:00 PM

q6 exam topic: terramearth, c: correct answer: copy 1petabyte to encrypted usb device ???
GERMANY


SAM 12/4/2023 12:56:00 AM

explained answers
INDIA


Andy 12/26/2023 9:35:00 PM

plan to take theaws certified developer - associate dva-c02 in the next few weeks
SINGAPORE


siva 5/17/2023 12:32:00 AM

very helpfull
Anonymous


mouna 9/27/2023 8:53:00 AM

good questions
Anonymous


Bhavya 9/12/2023 7:18:00 AM

help to practice csa exam
Anonymous


Malik 9/28/2023 1:09:00 PM

nice tip and well documented
Anonymous


rodrigo 6/22/2023 7:55:00 AM

i need the exam
Anonymous


Dan 6/29/2023 1:53:00 PM

please upload
Anonymous


Ale M 11/22/2023 6:38:00 PM

prepping for fsc exam
AUSTRALIA


ahmad hassan 9/6/2023 3:26:00 AM

pd1 with great experience
Anonymous


Žarko 9/5/2023 3:35:00 AM

@t it seems like azure service bus message quesues could be the best solution
UNITED KINGDOM


Shiji 10/15/2023 1:08:00 PM

helpful to check your understanding.
INDIA


Da Costa 8/27/2023 11:43:00 AM

question 128 the answer should be static not auto
Anonymous


bot 7/26/2023 6:45:00 PM

more comments here
UNITED STATES


Kaleemullah 12/31/2023 1:35:00 AM

great support to appear for exams
Anonymous


Bsmaind 8/20/2023 9:26:00 AM

useful dumps
Anonymous


Blessious Phiri 8/13/2023 8:37:00 AM

making progress
Anonymous


Nabla 9/17/2023 10:20:00 AM

q31 answer should be d i think
FRANCE


vladputin 7/20/2023 5:00:00 AM

is this real?
UNITED STATES


Nick W 9/29/2023 7:32:00 AM

q10: c and f are also true. q11: this is outdated. you no longer need ownership on a pipe to operate it
Anonymous


Naveed 8/28/2023 2:48:00 AM

good questions with simple explanation
UNITED STATES


cert 9/24/2023 4:53:00 PM

admin guide (windows) respond to malicious causality chains. when the cortex xdr agent identifies a remote network connection that attempts to perform malicious activity—such as encrypting endpoint files—the agent can automatically block the ip address to close all existing communication and block new connections from this ip address to the endpoint. when cortex xdrblocks an ip address per endpoint, that address remains blocked throughout all agent profiles and policies, including any host-firewall policy rules. you can view the list of all blocked ip addresses per endpoint from the action center, as well as unblock them to re-enable communication as appropriate. this module is supported with cortex xdr agent 7.3.0 and later. select the action mode to take when the cortex xdr agent detects remote malicious causality chains: enabled (default)—terminate connection and block ip address of the remote connection. disabled—do not block remote ip addresses. to allow specific and known s
Anonymous


Yves 8/29/2023 8:46:00 PM

very inciting
Anonymous